emoji-stealer-mrf/steal_emoji_policy.ex

74 lines
2.2 KiB
Elixir
Raw Normal View History

2020-03-22 16:41:29 +00:00
defmodule Pleroma.Web.ActivityPub.MRF.StealEmojiPolicy do
require Logger
@moduledoc "Detect new emoji and steal them"
@behaviour Pleroma.Web.ActivityPub.MRF
defp has_emojo(installed_emoji, str) do
result = for emojo <- installed_emoji, elem(emojo, 0) == str, do: true
length(result) == 1
end
@impl true
def filter(%{"object" => %{"emoji" => foreign_emoji}} = object) do
num_foreign_emoji = Kernel.map_size(foreign_emoji)
if num_foreign_emoji > 0 do
Logger.debug("#{num_foreign_emoji} EMOJI TO PROCESS")
installed_emoji = Pleroma.Emoji.get_all()
new_files =
for {emojo_shortcode, emojo_url} <- foreign_emoji,
!has_emojo(installed_emoji, emojo_shortcode) do
Logger.debug("HANDLING EMOJO")
2020-03-22 17:47:45 +00:00
cond do
String.contains?(emojo_shortcode, "/") ->
Logger.error("BAD EMOJO SHORTCODE: #{emojo_shortcode}")
String.starts_with?(emojo_url, "https://") ->
try do
remote_emojo = HTTPoison.get!(emojo_url)
if remote_emojo.status_code == 200 do
with {:ok, current_dir} <- File.cwd() do
new_file = current_dir <> "/priv/static/emoji/stolen/" <> emojo_shortcode <> Path.extname(emojo_url)
{:ok, file} = File.open(new_file, [:write])
IO.binwrite(file, remote_emojo.body)
File.close(file)
Logger.debug("SAVED EMOJO")
new_file
end
end
rescue
e in RuntimeError -> Logger.error("FAILED TO QUERY REMOTE EMOJO #{emojo_url} #{e}")
end
true ->
Logger.error("EMOJO COND FAIL #{emojo_shortcode} #{emojo_url}")
2020-03-22 16:41:29 +00:00
end
2020-03-22 17:47:45 +00:00
2020-03-22 16:41:29 +00:00
end
Logger.debug("EMOJI FILES: #{inspect(new_files)}")
if length(new_files) > 0 do
Logger.debug("RELOADING EMOJI")
Pleroma.Emoji.reload()
else
Logger.debug("NO EMOJI TO LOAD")
end
end
{:ok, object}
end
@impl true
def filter(object) do
{:ok, object}
end
@impl true
def describe, do: {:ok, %{}}
end